You need information about SQL Injection.
You want to know what SQL-Injection is.
The exploit of a security breach in conjuncton with SQL databases is called SQL Injection.
The attack is made possible by inadequate masking or verfication of meta characters in user input. An attacker is attempting to smuggle his own instructions through the programm that controls the access to the database. The goal of the attacker is to manipulate the data to his advantage or to gain control of the database server.
Disclaimer:The information provided in this document is intended for your information only. Lubby makes no claims to the validity of this information. Use of this information is at own risk!
About the Author
Author: Wim Peeters - Keskon GmbH & Co. KG
Wim Peeters is electronics engineer with an additional master in IT and over 30 years of experience, including time spent in support, development, consulting, training and database administration. Wim has worked with SQL Server since version 6.5. He has developed in C/C++, Java and C# on Windows and Linux. He writes knowledge base articles to solve IT problems and publishes them on the Lubby Knowledge Platform.
Latest update: 05/10/2020 | Comment: